Skip to main content
1.5: Chapter Review - Key Terms
-
-
Last updated
-
-
Save as PDF
-
Key Terms
-
Android operating system
-
Google software operating system used to run non-iPhone mobile phones such as Samsung’s Galaxy
-
artificial intelligence (AI)
-
use of computers, robots, and machines to behave “intelligently,” engaging in autonomous decision making and behaviors
-
augmented reality (AR)
-
use of digital objects or elements in a real-life picture or scene
-
automation
-
use of computers or machines to do tasks that could be completed by a person
-
binary digits
-
sequences of the numbers 0 and 1 used in computer programming
-
biometrics
-
authentication that uses a person’s physical characteristics as a form of digital security
-
cache
-
type of storage in a computer that operates in the background, holding data that can be quickly retrieved
-
central processing unit (CPU)
-
unit that contains the microprocessor, or “brains” of a computer system
-
client
-
device that requests and uses resources from other devices on the network
-
cloud
-
servers housed in data centers to facilitate remote storage and computer operations
-
cloud computing
-
delivering computer resources such as programs and data storage through the internet rather than storing resources directly on a computer
-
computer
-
programmable machine that can execute predetermined lists of instructions and respond to new instructions
-
computer security
-
protection of computer systems and information that prevents unauthorized use
-
cookies
-
small data files that are deposited on user hard disks and internet sites visited
-
cybercrime
-
criminal offense that involves a computer and a network
-
data erasure
-
process by which information is not only deleted but overwritten as well
-
data masking
-
process by which personally identifiable information is removed from data, allowing a company to make decisions without violating customer privacy
-
data resiliency
-
ability to recover quickly from a data breach
-
domain name system (DNS)
-
phone book for the internet, enabling a user to send a message using their name, the symbol @, and the location of the computer as identified by its domain name
-
e-commerce
-
conducting business transactions online
-
encryption
-
process of taking information transmitted through the internet and converting it into an unrecognizable code to prevent unauthorized access
-
ethernet
-
protocols used to connect computers in a local area network or LAN
-
external disk drive
-
hard disk for information storage such as USBs, CDs, DVDs, and flash memory cards
-
firewall
-
barrier between a network that is secured and one that is not secured
-
hackers
-
individuals who gain unauthorized access to a computer system to steal someone’s information
-
hard disk
-
secondary storage areas where users can save files and retrieve data and programs
-
hardware
-
computer accessories such as keyboard, mouse, printer, and computer monitor
-
HTTPS
-
communication protocol that is more secure than HTTP
-
hub
-
device that sends and receives messages to and from all network connections
-
hyperlink
-
link on a page or document that, when clicked, navigates the user to that location; a connection between two web pages or documents
-
hypertext transfer protocol (HTTP)
-
rules that allow users to access information on the internet and protect confidential data such as credit card numbers
-
information processing cycle
-
sequence of events involved in processing information
-
internal disk drive
-
storage space within the computer that updates and produces copies of files
-
Internet of Things (IoT)
-
extension of internet connectivity beyond computers, enabling the transfer of information between machines and other objects, people, and animals by connecting them to the internet in some way
-
internet protocol address (IP address)
-
unique combination of characters used to identify the location of a host computer
-
internet service provider (ISP)
-
company that provides individuals or organizations with access to the internet
-
intranet
-
private network for internal company use; can be combined with cloud technology
-
iPhone operating system (iOS)
-
Apple’s software operating system, used to run iPhones, iPads, and other mobile devices
-
machine learning
-
use of software applications to make computations and decisions that can inform predictions without human intervention
-
mainframe
-
computer that is capable of great processing speed and data storage for large organizations
-
malware
-
software designed to damage the victim’s computer system once it gains access to it
-
microchip
-
small microprocessor unit used for programming and computer memory storage
-
microcomputer
-
personal computer that was much smaller than earlier computers and operated with microprocessors
-
microprocessor
-
consists of a control and an arithmetic-logic unit, which performs math and logical operations within a computer system
-
minicomputer
-
computer that is similar in power to a mainframe computer, but much smaller in size; used in mid-size organizations
-
motherboard
-
controls communications for an entire computer system
-
nanotechnology
-
technology that focuses on changing individual molecules to produce different properties or attributes
-
network
-
connection of two or more computer systems or devices, either by a cable or through a wireless connection
-
operating system
-
connection between a device’s hardware and its software
-
packet switching
-
technology that enabled the development of the internet; computer files are broken up into segments, which are transmitted over the network and reordered into a single file at their destination
-
password management
-
set of principles and best practices for storing and managing passwords to prevent unauthorized access to the computer
-
personal computer (PC)
-
microcomputer suitable for individual use
-
phishing
-
attempts to get users to interact with an email or website that appears to be legitimate but is fake
-
random access memory (RAM)
-
computer’s primary, short-term memory
-
ransomware
-
malicious software that encrypts computer data, rendering it useless and inaccessible, forcing the owner to exchange something of value to regain access
-
read-only memory (ROM)
-
memory not meant for storage but to process information as the computer is being used
-
robotics
-
use of robotic machines to perform tasks that no human could perform
-
router
-
device that directs data traffic and allows for multiple devices to run on a network
-
secure sockets layer (SSL)
-
security protocol that uses encryption to help ensure privacy of information and communications across the internet
-
server
-
connects devices and allows for resource sharing across networks
-
short message service (SMS)
-
technology for sending text messages through mobile phones
-
smart space
-
physical space that incorporates technologies that can be controlled through the internet
-
social media
-
digital technology that allows users (individuals and organizations) to share information about themselves such as posts, photos, and videos
-
software
-
computer program or set of programs with the end goal of converting data into processes or actions
-
spoofing
-
correspondence such as email that appears legitimate but instead is used to obtain your personal information
-
supercomputer
-
extremely powerful computer that has the fastest processors available
-
transmission control protocol/internet protocol (TCP/IP)
-
communication standard that allows data to be sent and received over a network, most notably the internet
-
triangulation
-
research technique whereby information is verified and validated through multiple sources
-
virtual reality (VR)
-
simulated environment in which users can interact as if they were physically present
-
wearable
-
device that uses computing technology to collect and receive data via the internet
-
web browser
-
a program used to find content stored on the WWW
-
workstation
-
powerful single-user computer, similar to a personal computer but with more powerful microprocessors